Learning Penetration Testing of Android Applications
-
Updated
Aug 5, 2017 - Java
Learning Penetration Testing of Android Applications
This repository contains the material for one lecture about Two-Server Blind Password Registration based on the Paper "Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols" by Franziskus Kiefer and Mark Manulis.
Hash collision detecting algorithm based on Floyd cycle detection. Created at the University as the project within IT Security classes in 2016. The purpose of this task was to learn how hash functions works and become aware of IT security threats.
A backup program employing the use of SquashFS, Aufs and Rsync
🔐 Docker Container for Penetration Testing & Security
Prøveeksamen i programmering og teknologi på 3. semester.
Eksamen i programmering og teknologi på 3. semester.
A dummy malware app that will log motion sensor data in background and send it to msd-server for further analysis
An Android app collecting motion sensor data for further analysis
Lernunterlagen für das Proseminar IT-Sicherheit
Seminararbeit über Zero-Knowledge-Beweise
Bramble is a hacking Open source suite.
Simple voltage glitcher implementation for the Lattice iCEstick Evaluation Kit
Simple voltage glitcher implementation for the iCEBreaker FPGA board
The next Generation of Realtime Filesystem Monitoring Program
CORIA v3.1 CORIA (Connectivity Risk Analyzer) is a framework for analyzing network connectivity risks on graphs with millions of vertices and edges using GPU-accelerated software modules. Built for my master's thesis, November 2020.
==> Coursera: Google IT Support Professional Certificate Offered by Google.
Botnet targeting Windows machines written entirely in Python & open source security project.
Add a description, image, and links to the it-security topic page so that developers can more easily learn about it.
To associate your repository with the it-security topic, visit your repo's landing page and select "manage topics."